You need to agree to share your contact information to access this dataset

This repository is publicly accessible, but you have to accept the conditions to access its files and content.

Log in or Sign Up to review the conditions and access this dataset content.

πŸ” Network Anomaly Logs β€” French Industrial Infrastructure

Description

50,000 synthetic network logs from French industrial infrastructure environments, with expert anomaly annotations.

Built by a cybersecurity practitioner with real-world experience in VLAN segmentation, pfSense, and Zabbix monitoring environments. Data is realistic, structured, and ready to use for ML training.


πŸ“Š Statistics

Split Examples Normal Anomalies
Train 40,000 34,000 6,000
Val 5,000 4,250 750
Test 5,000 4,250 750
Total 50,000 42,500 7,500
  • Anomaly rate: 15%
  • Format: JSONL (one example per line)

🚨 Anomaly Types

Type Description Severity
port_scan Sequential port scanning Medium
data_exfiltration Large outbound transfer to unknown IP Critical
brute_force_ssh Repeated failed SSH login attempts High
ddos_flood Volumetric UDP/ICMP flood Critical
c2_communication Periodic C2 server beaconing Critical
lateral_movement Internal machine-to-machine movement High
dns_tunneling Data exfiltration via DNS queries High
credential_dump Access to authentication resources Critical

πŸ“‹ Schema

Each example contains the following fields:

{
  "id": "log_00000001",
  "timestamp": "2025-01-01T00:29:52.311Z",
  "src_ip": "10.10.30.229",
  "src_port": 64132,
  "src_vlan": "CLI",
  "dst_ip": "194.165.84.245",
  "dst_port": 443,
  "dst_vlan": "EXTERNAL",
  "protocol": "TCP",
  "bytes_sent": 1240,
  "bytes_received": 8430,
  "packets_sent": 3,
  "packets_received": 12,
  "duration_ms": 234,
  "ttl": 128,
  "tcp_flags": "ACK",
  "user_agent": null,
  "is_anomaly": false,
  "anomaly_type": null,
  "severity": null,
  "description": null,
  "label": "normal_https_browse"
}

πŸ—οΈ Infrastructure Context

Logs simulate a segmented French industrial network with 4 VLANs:

VLAN Subnet Role
ADM 10.10.10.0/24 Administration
SRV 10.10.20.0/24 Servers
CLI 10.10.30.0/24 Clients
EXTERNAL β€” Internet

🎯 Use Cases

  • Network Intrusion Detection Systems (NIDS)
  • Anomaly detection model training & fine-tuning
  • Cybersecurity benchmark evaluation
  • SIEM rule validation & testing
  • ML research on network security

πŸ“¦ Access

This dataset is gated β€” request access using the button above.

Access is free. Once approved, you will receive a download link with:

  • βœ… Full 50,000 examples (train / val / test splits)
  • βœ… Python generation script
  • βœ… Commercial use license (CC BY 4.0)

πŸ“œ License

Creative Commons Attribution 4.0 International (CC BY 4.0)

Commercial use allowed with attribution.


πŸ“¬ Contact & Custom Datasets

Need a custom dataset with specific anomaly types, volume, or format?

πŸ“§ Contact: soon mail incoming

Downloads last month
8